A technician documents the findings of illegal material that was found on a workstation. Which of the following should the technician do NEXT when storing the workstation?
A. Set all users to administrators
B. Destroy the hard drive
C. Reimage the workstation and deploy
D. Adhere to the chain of custody
Answer: D. Adhere to the chain of custody
Computer Science & Information Technology
You might also like to view...
____ are the most common way to access resources available throughout the environment.
A. System boosters B. Network ports C. Firewalls D. Data scopes
Computer Science & Information Technology
Within the parentheses of the for statement are ____ items separated by semicolons.
A. two B. three C. four D. five
Computer Science & Information Technology